A diagnostics and prediction system including a cloud system that continuously collects operating parameters from each of a number of environmental sensors and provides access to this data by a plurality of processing applications including (1) a predictive modeling system including (a) a health prediction system, (b) a sensor false alarm prediction system, (c) a zone false alarm prediction system and (d) a reporting system, (2) a system that diagnoses and predicts environmental hazardous areas and clusters areas based upon concentrations of CO in the site or building; and (3) a battery prediction system that predicts a battery life for the sensor.
|
1. A monitoring device, comprising:
a memory; and
a processor coupled to the memory, wherein the processor is configured to execute executable instructions stored in the memory to:
collect operating parameters from a sensor that detects threats within a geographic area over a time period;
determine a rate of change of the operating parameters;
extrapolate the rate of change of the operating parameters using non-linear regression over the time period in response to the rate of change of the operating parameters being intermittent; and
determine a probability of a false alarm of the sensor based upon the time period.
7. A fire system, comprising:
a sensor configured to detect threats within a geographic area; and
a monitoring device, comprising:
a memory; and
a processor coupled to the memory, wherein the processor is configured to execute executable instructions stored in the memory to:
collect operating parameters from the sensor over a time period;
determine a rate of change of the operating parameters;
extrapolate the rate of change of the operating parameters using linear regression over the time period in response to the rate of change of the operating parameters remaining constant; and
determine a probability of a false alarm of the sensor based upon the time period.
18. A method, comprising:
collecting operating parameters at a monitoring device from an environmental sensor configured to detect threats within a geographic area over a time period;
determining a rate of change of the operating parameters at the monitoring device;
extrapolating the rate of change of the operating parameters using linear regression over the time period in response to the rate of change of the operating parameters remaining constant at the monitoring device;
extrapolating the rate of change of the operating parameters using non-linear regression over the time period in response to the rate of change of the operating parameters being intermittent at the monitoring device; and
determining a probability of a false alarm of the environmental sensor based upon the time period at the monitoring device.
2. The device of
extrapolate the rate of change of the operating parameters using linear regression over the time period in response to the rate of change of the operating parameters remaining constant.
3. The device of
store the operating parameters in the memory.
4. The device of
5. The device of
6. The device of
8. The system of
extrapolate the rate of change of the operating parameters using non-linear regression over the time period in response to the rate of change of the operating parameters being intermittent.
9. The system of
combine information from a manufacturer with the operating parameters.
10. The system of
generate a probability report including the determined probability of the false alarm of the sensor based upon the time period.
11. The system of
send the probability report to a user.
13. The system of
store at least one of: the operating parameters, an installation date, or last maintenance date of the sensor in the sensor memory.
14. The system of
provide at least one of: the operating parameters, the installation date, or the last maintenance date of the sensor to the monitoring device.
15. The system of
collect operating parameters from a different sensor.
16. The system of
determine a probability of a false alarm of the different sensor based upon the time period.
17. The system of
cluster the sensor and the different sensor into a false alarm zone.
19. The method of
20. The system of
|
This application is a continuation of U.S. application Ser. No. 14/842,278, filed Sep. 1, 2015, the contents of which are incorporated herein by reference.
This application relates to security systems and more particular to the monitoring and early prediction, forecasting of probabilistic event occurrences in security systems.
Systems are known to protect people and assets within secured areas. Such systems are typically based upon the use of one more sensors that detect threats within the areas.
Threats to people and assets may originate from any of number of different sources. For example, a fire may kill or injure occupants who have become trapped by a fire in a home. Similarly, carbon monoxide from a fire may kill people in their sleep.
Alternatively, an unauthorized intruder, such as a burglar, may present a threat to assets within the area. Intruders have also been known to injure or kill people living within the area.
In the case of intruders, sensors may be used along a periphery and used while people are home. Other sensors may be placed within the interior and used when people are not home.
In most cases, threat detectors are connected to a local control panel. In the event of a threat detected via one of the sensors, the control panel may sound a local audible alarm. The control panel may also send a signal to a central monitoring station.
While conventional security systems work well, they may degrade and fail after some period of time. This can present an additional threat to a home or building owner and the occupants of the building. Accordingly, a need exists for better methods and apparatus for monitoring for such situations.
While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing same, and is not intended to limit the application or claims to the specific embodiment illustrated.
The sensors may detect any of a number of different types of threats. For example, at least some of the sensors may be environmental sensors (e.g., smoke, fire, carbon monoxide, etc.).
Other of the sensors may be intrusion sensors. For example, some of the sensors may be switches placed on the doors and windows providing entrance into and egress from the secured area. Others of the sensors may be passive infrared (PIR) sensors placed within an interior of the secured area to detect intruders who have been able to avoid sensors placed along a periphery of the secured area. Still other sensors may be closed circuit television (CCTV) cameras with the capability of detecting the motion of intruders.
The sensors may be monitored by a control panel 18. The control panel may be located within the secured area (as shown in
Upon detection of activation by the control panel of one of the sensors, the control panel may send an alarm message to a central monitoring station 20. The central monitoring station may respond by summoning the appropriate help (e.g., police department, ambulance, fire department, etc.).
The security system may be controlled via a user interface 36. In this regard, an authorized human user may enter a personal identification (PIN) number and function key (or simply a function key) to arm the security system. Similarly, the user may enter a PIN and disarm key to disarm the security system.
Also included within the security system is a cloud app and monitoring system 22. The cloud monitoring system operates to monitor a status of each of the sensors within the security system via the Internet 24.
Located within the cloud system, the control panel and each of the sensors may be control circuitry that provides the functionality described herein. The control circuitry may include a number of processor apparatus (processors) 26, 28, each operating under control of one or more computer programs 30, 32 loaded from a non-transitory computer readable medium (memory) 34. As used herein reference to a step performed by a computer program is also reference to the processor that executed that step.
For example, a status processor may monitor the user interface for control instructions. Upon receiving an arm away instruction, the status processor assumes an armed state. Upon receiving a disarm instruction, the status processor assumes a disarmed state.
Similarly, an alarm processor responds to the status processor entering the armed state by monitoring the sensors. Upon detecting activation of one of the sensors, the alarm processor may compose an alarm message for transmission to the central monitoring station. The alarm message may include an identifier of the security system (e.g., an account number, an address, etc.), an identifier of any activated sensors, an identifier of the type of sensor, or a location of the sensor within the secured area and a time.
Also operating within the security system are one or more reporting processor(s) that periodically (e.g., once every minute, once every hour, once a day, etc.) reports status information from the sensors to the cloud system. The reporting processor(s) may be located within each of the sensors and/or the control panel and may report any of a number of different factors associated with the sensor. For example, the reporting processor may send a report to the cloud system each time a sensor is activated. In addition, the reporting processor may internally monitor and report on maintenance activity performed on the sensor by detecting removal of a cover that protects the sensor. The reporting processor may also perform a self-check of the sensor and report the results to the cloud app.
For example, in the case of a smoke sensor, the reporting application may measure an instantaneous value from a detector element within the smoke sensor and send the value to the cloud app. A number of associated values may also be reported to the cloud app. Associated values may include a threshold value used by the sensor to detect or not detect smoke. Another value may be a value provided by the detector element when it was first installed and periodically thereafter. Other associated values may include a date of installation or last maintenance date if such values are saved in internal memory.
A similar set of status, detector element and associated values may be reported for carbon monoxide and intrusion sensors. In the case of a PIR detector, the detector element values may be the individual outputs of a pair of infrared (IR) detectors.
In addition to status, detector element and associated values, the reporting processor also reports an identifier of the sensor and of the security system within which the sensor operates. A geographic location of each sensor may also be reported in order to identify a zone within which the sensor is located.
Within the cloud app, the status detector element and associated values are each stored within a respective file 42, 44 of the sensor in a cloud database. The files, in turn, are retrieved and used by a number of respective applications to predict false alarms, failures and other unanticipated events. For example, one of the respective applications may include a health prediction system that uses parameters collected from each system to predict the health of the system. The health prediction system may compare the collected values from each detection element with one or more threshold values to classify the sensor as either good or bad (i.e., operative or inoperative). Alternatively, the health prediction system may use values from a self-check processor to determine the operability of the sensor. Once the operability of each sensor is determined, the health prediction system may generate a report on the overall health of the system and send the report to one or more human users of the system. The report may include a list of the numbers of each type of sensor, the number of good sensors of each type and the number of bad sensors for each type. The report may also include the number of good (i.e., effectively working) sensors and bad (i.e., effectively not working) sensors per geographic area within the secured area.
Another of the applications may be a sensor false alarm prediction system. This system may retrieve the most recently measured detector element values and compare them with previously measured values. In this case, a processor of the system may compare the most recently measured value with prior values to detect spontaneous changes and to determine a rate of change of the value over time. In each case, the instantaneous value, the spontaneous changes and changes over time are used to determine a probability of malfunction or failure over some time period (e.g., the next day, next week, next month, etc.).
Under one illustrated embodiment, the instantaneous changes and changes over time are compared with a library of values associated with sensor performance and failure modes to determine the probability of failure for the sensor being considered. Once the predicted failure of each sensor is determined, an overall failure probability for the system is generated and sent to an authorized human user. The report may provide an overall predicted failure rate for the system and also the number of good and bad sensors per geographic area within the secured area.
Another of the applications may include a zone false alarm prediction system. In this case, a processor may use the predicted failure value to identify one or more geographic zones with the highest relative probability of failure. The processor may cluster these zones based upon the probability of failure over some time period. This information may be used to generate a two or three-dimensional floor plan (map) identifying the areas with the highest probability of failure. The floor plan is sent to authorized users.
Another of the applications may include a reporting system that reports the data to each authorized user. This system generates a graphical, probabilistic, predicted, possible false alarm report including information from the health prediction system, the sensor false alarm prediction system and the zone false alarm prediction system.
Still another of the applications may include an environmentally hazardous area detection system. This system may include a processor that retrieves CO detection levels from each sensor, the detection state of the sensor and the maintenance record of each sensor. The processor executes a program that provides a statistical inference model for each area of the site or building of the secured area and clusters areas into hazardous areas based upon concentrations of CO in the site or building. The program generates a report as above displaying the data on a two or three-dimensional map.
Another of the applications is a battery prediction system. The battery prediction system retrieves battery status for each wireless sensor. The processor may receive a time period from the user interface. In the case of a mesh network, the processor may also determine a parent child status of each sensor and the operating time of each sensor under that mode of operation. Based upon this information, the processor predicts a battery life for each sensor.
False alarms have been a major problem in the fire alarm industry. Most of the false alarms happen for a number of different reasons. Some of the alarms happen because of the external environment over which a user has no control. For example, if there is a constant and slow accumulation of dust in the chamber of a fire detector, then a threshold will be reached in X days where there would be a false alarm in the building.
On the other hand, if it is possible to let the user know that there might be a false alarm or that the device might not work as expected because of the dust accumulating in the device, it could be used to help building owners, building management system team, or other stakeholders in a number of different ways. For example, if a mechanism existed to let a user know that at least some of the devices would generate a false alarm in X days, effective maintenance operations can be performed to avoid false alarms.
Alternatively, if there is too much variation among the sensitivities of different devices in a zone, then these variations raise questions about the reliability of the system. This is the case because some devices might trigger an alarm quickly while others may take more time.
The system of
Third, the cloud provides and continuously executes a number of intelligent algorithm (programs) to track and predict any change in the sensors and uses its intelligence, data mining and statistical analytical capabilities to predict the probability of a false alarm occurring. When the environment of the sensors remains constant and the rate of change in the device parameters follows a consistent pattern, the algorithm extrapolates using a linear regression analysis and provides or otherwise comes up with a probability of false alarm in X number of days. For example, assume that the dust percentage obscuration in a device is increasing at a constant interval over a time period of X days. In this case there would be a probability of a false alarm in the coming Y days. Here the probabilities will be higher as the dust accumulates. Alternatively, when there is random change in the device behavior, then a statistical non-linear regression analysis process may use a least square method to find the best fitting line of failure probability based upon Bayes prediction theory. In this case, the different parameters provide different probabilities of the device giving a false alarm in the future.
Fourth, the predicted false alarms along with their locations can be sent to any or all stake holders in a desirable format. These reports can be pulled from anywhere by any or all stake holders. Fifth, maintenance activity can be concentrated on these areas to reduce the cost/effort/time of the maintenance.
These concepts may be demonstrated using the example of a smoke alarm. For example, to determine or to predict false smoke alarms with a good probability of prediction success, a statistical inference method or procedure may be used. A statistical method may be used because parameters (predictor) values observed over a period may be non-linear (i.e., they represent a nonlinear dynamical system) and do not perfectly predict false alarms in a deterministic sense.
Linear regression is one mining methods/techniques used for predicting future values of variables. Relationships between independent variables (which can be smoke level) and dependent variables (month or day) can be described by the relationship y=a+bn, where y is a dependent variable, n is an independent variable and a and b are line coefficients.
A least square method may be employed to find the best fitted regression line (least-square regression line). For y=a+bn, the residual error, ei=yi−ŷi, where a={right arrow over (y)}−b{right arrow over (n)}, and
One approach to performing linear regression is to use a Bayesian regression approach. In this case, prior information (parameters from the sensor) can be combined with other prior information (e.g., from a manufacturer) to form a distribution of false alarm probabilities for further sensor analysis as shown
The system of
The system of
The system provides a method of clustering predicted false alarm zones, comparing variance among the sensitivities of different devices and clustering them into zones for effect maintenance. It provides a method of preparing a graphical probabilistic predicted possible false alarm report for effective maintenance operations. It provides a method of reducing the cost of maintenance operations by concentrating only on possible false alarms in zones/devices rather than all zones/devices during maintenance.
In general, the system of
Alternatively, the system of
Alternatively, the system of
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims. Further, logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be add to, or removed from the described embodiments.
Nalukurthy, RajeshBabu, Sethi, Aatish, Prasad Naraharisetti, Kanaka Nagendra, Reddy Singam, Kiran
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10362975, | Dec 30 2015 | DEXCOM, INC | System and method for factory calibration or reduced calibration of an indwelling sensor based on sensitivity profile and baseline model of sensors |
10431073, | Oct 07 2016 | VIVINT, INC. | False alarm reduction |
10522031, | Sep 01 2015 | Honeywell International Inc. | System and method providing early prediction and forecasting of false alarms by applying statistical inference models |
5710723, | Apr 05 1995 | Dayton T., Brown; DAYTON T BROWN, INC | Method and apparatus for performing pre-emptive maintenance on operating equipment |
5786756, | Nov 23 1993 | Cerberus AG | Method and system for the prevention of false alarms in a fire alarm system |
6665004, | May 06 1991 | SENSORMATIC ELECTRONICS, LLC | Graphical workstation for integrated security system |
7103509, | Nov 23 2004 | General Electric Company | System and method for predicting component failures in large systems |
7142105, | Feb 11 2004 | Southwest Sciences Incorporated | Fire alarm algorithm using smoke and gas sensors |
8290559, | Dec 17 2007 | DEXCOM, INC | Systems and methods for processing sensor data |
9098553, | Mar 15 2013 | Trove Predictive Data Science, LLC | System and method for remote activity detection |
9852599, | Aug 17 2015 | ALARM COM INCORPORATED | Safety monitoring platform |
20030065409, | |||
20140266669, | |||
20150015401, | |||
20150022339, | |||
20150213703, | |||
20190098039, | |||
20200218801, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Aug 07 2015 | NALUKURTHY, RAJESHBABU | Honeywell International Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 051346 | /0050 | |
Aug 07 2015 | SETHI, AATISH | Honeywell International Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 051346 | /0050 | |
Aug 07 2015 | NARAHARISETTI, KANAKA NAGENDRA PRASAD | Honeywell International Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 051346 | /0050 | |
Aug 07 2015 | REDDY SINGAM, KIRAN | Honeywell International Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 051346 | /0050 | |
Dec 20 2019 | Honeywell International Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Dec 20 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Apr 11 2026 | 4 years fee payment window open |
Oct 11 2026 | 6 months grace period start (w surcharge) |
Apr 11 2027 | patent expiry (for year 4) |
Apr 11 2029 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 11 2030 | 8 years fee payment window open |
Oct 11 2030 | 6 months grace period start (w surcharge) |
Apr 11 2031 | patent expiry (for year 8) |
Apr 11 2033 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 11 2034 | 12 years fee payment window open |
Oct 11 2034 | 6 months grace period start (w surcharge) |
Apr 11 2035 | patent expiry (for year 12) |
Apr 11 2037 | 2 years to revive unintentionally abandoned end. (for year 12) |